L3S

Das L3S ist ein Forschungszentrum für grundlagen- und anwendungsorientierte Forschung im Bereich Digitale Transformation sowie Data- und Web-Science. L3S-Forscher entwickeln zukunftsweisende Methoden und Informationstechnologien für intelligente, zuverlässige und verantwortungsvolle Systeme, welche zur Gestaltung der digitalen Transformation und zur nachhaltigen Innovation beitragen. Der Wissentransfer in Wirtschaft, Politik und Gesellschaft bildet einen zentralen Baustein der Aktivitäten des L3S.

Das L3S erforscht die Auswirkungen des digitalen Wandels, um aus den Erkenntnissen Handlungsoptionen, -empfehlungen sowie Innovationsstrategien für die Wirtschaft, die Politik und Gesellschaft herzuleiten. Durch Forschung, Entwicklung und Beratung trägt das L3S gemeinsam mit seinen Partnern zur digitalen Transformation insbesondere in den Bereichen Mobilität, Gesundheit, Produktion und Bildung bei.

Das L3S ist eine gemeinsame Einrichtung der Leibniz Universität Hannover und der Technischen Universität Braunschweig mit rund 150 Wissenschaftlern aus unterschiedlichen Disziplinen an Universitäten und einem Leibniz-Institut (der TIB). Das aktuelle jährliche Drittmittelvolumen des L3S beträgt etwa 6 Mio. Euro, Niedersachsen fördert das L3S zusätzlich mit jährlich etwa 2 Mio. Euro. Das L3S wurde 2011 und 2014 vom Wissenschaftsrat als exzellente Einrichtung evaluiert, führend im Bereich Web Science.

  • The Kourovka Notebook, mbox sixteenth ed., Russian Academy of Sciences. Mazurov, 1V. D.; Khukhro(eds.), E. I. (2006).
  • Milligram-Scale Assembly and NMR Fingerprint of Tau Fibrils Adopting the Alzheimer’s Disease Fold. Duan, Pu; El Mammeri, Nadia; Hong, Mei (2024).
  • A measured inclusion of an RTI tool for the South Pacific. Sharma, Bibhya; Reddy, Pritika; Singh, Vineet Y. Li, H. Nishi, P. Pang (eds.) (2024). 159–164.
  • Automatic Classification of Museum Artifacts based on Unsupervised Models. Wang, Hao Y. Li, H. Nishi, P. Pang (eds.) (2024). 116–119.
  • The Impact of Large Language Models on Social Media Communication. Qi, Jinhu Y. Li, H. Nishi, P. Pang (eds.) (2024). 165–170.
  • Design of Portable Non-contact Physiological Data Acquisition System. Tian, Zandong; Chen, Qian; Peng, Jiahe; Zang, Dongyuan; Feng, Mianshi; Su, Weihua Y. Li, H. Nishi, P. Pang (eds.) (2024). 35–41.
  • College student employment quality assessment model based on BiLSTM-CNN. Wang, Chunjing; Xiao, Jun; Hong, Yue; Luo, Xu Y. Li, H. Nishi, P. Pang (eds.) (2024). 133–138.
  • Between Theory and Value Transactions: A Multifaceted Exploration of Relevance and Resilience of Decentralised Autonomous Organisations. Pinio, Pawel; Batko, Roman; Lewicka, Dagmara Y. Li, H. Nishi, P. Pang (eds.) (2024). 42–48.
  • Parenting Support System Based on Improved VGG19 Network. Zhang, Yan; Li, Jiacheng; Noto, Masato Y. Li, H. Nishi, P. Pang (eds.) (2024). 84–91.
  • Ensemble Model of Lanczos and Bicubic Interpolation with Neural Network and Resampling for Image Enhancement. Bituin, Ronie C.; Antonio, Ronielle B. Y. Li, H. Nishi, P. Pang (eds.) (2024). 110–115.
  • What Really Matters? Turnover Intention Factors of Software Developers. Lewicka, Dagmara; Zajac, Pawel; Batko, Roman Y. Li, H. Nishi, P. Pang (eds.) (2024). 139–146.
  • Using Data Mining to Uncover Association of Philippines’ Demographic Data to Tuberculosis. Hernando, Kimberly B.; Samonte, Mary Jane C. Y. Li, H. Nishi, P. Pang (eds.) (2024). 49–57.
  • Data, analytics, and Intelligence: A Unified Approach. Sun, Zhaohao Y. Li, H. Nishi, P. Pang (eds.) (2024). 62–70.
  • Research on public housing allocation based on public housing information management system-Take Wuhan University of Technology. Xie, Yi; Wu, Yuting; Luo, Xu Y. Li, H. Nishi, P. Pang (eds.) (2024). 153–158.
  • How Natural Language Processing Enables AIGC Recognition? -Latest Trends and Future Prospects. Wang, Weizheng; Qiao, Hong Y. Li, H. Nishi, P. Pang (eds.) (2024). 103–109.
  • Understanding Google’s Perspective on 503 Status Codes. w3era (w3era, ed.) (2024).
  • Introduction to Philosophy Notes. Siddique, Muhammad Moghira (2024).
  • StructLM: Towards Building Generalist Models for Structured Knowledge Grounding. Zhuang, Alex; Zhang, Ge; Zheng, Tianyu; Du, Xinrun; Wang, Junjie; Ren, Weiming; Huang, Stephen W.; Fu, Jie; Yue, Xiang; Chen, Wenhu (2024).
  • KI entlarvt KI-Lügen: Projekt noFake trainiert Datenmodelle für Faktenchecks. Grävemeyer, Arne (2024). (10/2024) 128–131.
  • Künstliche Intelligenz: Die Mathematik hinter neuronalen Netzen. Trinkwalder, Andrea (2024).
  • Grundlagen des maschinellen Lernens erklärt. Drehling, Wilhelm (2024).
  • Study on Course Group based on Clustering Algorithm and Association Rules. Ao, Xiqin; Wu, Weiwei; Meng, Cuicui; He, Aixiang Y. Li, H. Nishi, P. Pang (eds.) (2024). 71–76.
  • How to Find New Onion Hidden Service based on Blind Secret Key?. Ding, Jianwei; Li, Xinze; Li, Hang; Chen, Zhouguo Y. Li, H. Nishi, P. Pang (eds.) (2024). 1–6.
  • Sustainable Post-COVID 19 Global Supply Chain Management: Conceptual Framework. Eberi-Kalu, Onwukwe (2024). 4(1) 775–779.
  • On the Possibility of a Backdoor in the Micali-Schnorr Generator. Davis, Hannah; Green, Matthew D.; Heninger, Nadia; Ryan, Keegan; Suhl, Adam in Lecture Notes in Computer Science, Q. Tang, V. Teague (eds.) (2024). (Vol. 14601) 352–386.
  • Fully Dynamic Attribute-Based Signatures for Circuits from Codes. Ling, San; Nguyen, Khoa; Phan, Duong Hieu; Tang, Khai Hanh; Wang, Huaxiong; Xu, Yanhong in Lecture Notes in Computer Science, Q. Tang, V. Teague (eds.) (2024). (Vol. 14601) 37–73.
  • sfReSolveD: Shorter Signatures from Regular Syndrome Decoding and VOLE-in-the-Head. Cui, Hongrui; Liu, Hanlin; Yan, Di; Yang, Kang; Yu, Yu; Zhang, Kaiyi in Lecture Notes in Computer Science, Q. Tang, V. Teague (eds.) (2024). (Vol. 14601) 229–258.
  • Probabilistic Hash-and-Sign with Retry in the Quantum Random Oracle Model. Kosuge, Haruhisa; Xagawa, Keita in Lecture Notes in Computer Science, Q. Tang, V. Teague (eds.) (2024). (Vol. 14601) 259–288.
  • On Instantiating Unleveled Fully-Homomorphic Signatures from Falsifiable Assumptions. Gay, Romain; Ursu, Bogdan in Lecture Notes in Computer Science, Q. Tang, V. Teague (eds.) (2024). (Vol. 14601) 74–104.
  • Cryptanalysis of the Peregrine Lattice-Based Signature Scheme. Lin, Xiuhan; Suzuki, Moeto; Zhang, Shiduo; Espitau, Thomas; Yu, Yang; Tibouchi, Mehdi; Abe, Masayuki in Lecture Notes in Computer Science, Q. Tang, V. Teague (eds.) (2024). (Vol. 14601) 387–412.
  • Breaking Parallel ROS: Implication for Isogeny and Lattice-Based Blind Signatures. Katsumata, Shuichi; Lai, Yi-Fu; Reichle, Michael in Lecture Notes in Computer Science, Q. Tang, V. Teague (eds.) (2024). (Vol. 14601) 319–351.
  • Formalizing Hash-then-Sign Signatures. Poettering, Bertram; Rastikian, Simon in Lecture Notes in Computer Science, Q. Tang, V. Teague (eds.) (2024). (Vol. 14601) 289–315.
  • Updatable Policy-Compliant Signatures. Badertscher, Christian; Maitra, Monosij; Matt, Christian; Waldner, Hendrik in Lecture Notes in Computer Science, Q. Tang, V. Teague (eds.) (2024). (Vol. 14601) 105–132.
  • Threshold Structure-Preserving Signatures: Strong and Adaptive Security Under Standard Assumptions. Mitrokotsa, Aikaterini; Mukherjee, Sayantan; Sedaghat, Mahdi; Slamanig, Daniel; Tomy, Jenit in Lecture Notes in Computer Science, Q. Tang, V. Teague (eds.) (2024). (Vol. 14601) 163–195.
  • A Low-Ops IaaS Cloud Framework based on Cloud-native Architecture. Zhao, Haotian; Sun, Yuchen Y. Li, H. Nishi, P. Pang (eds.) (2024). 29–34.
  • Unmanned Aerial Vehicle (UAV) Predictive Control Energy Management Model. Hendrarini, Nina; Sani, Muhammad Ikhsan Y. Li, H. Nishi, P. Pang (eds.) (2024). 147–152.
  • Lightweight Cloud Native Application Management Platform. Chen, Yanpiao; Peng, Shan Y. Li, H. Nishi, P. Pang (eds.) (2024). 126–132.
  • Employing Naive Bayes Algorithm in the Analysis of Students Academic Performances. Amahan, Pilita A. Y. Li, H. Nishi, P. Pang (eds.) (2024). 58–61.
  • Predicting ESG Ratings by Machine Learning and Analyzing Influencing Factors by XAI. Choi, Jeong-Cheol; Chen, Qiuying; Lee, Sang-Joon Y. Li, H. Nishi, P. Pang (eds.) (2024). 120–125.
  • Deep Learning Method for Leakage Location Detection of Pneumatic Systems Based on Infrared Thermal Image Evaluation. Chang, Jiaqi; Shi, Yan; Yang, Liman; Niu, Yanxia; Nie, Yulong; Yang, Zhiguo; Li, Lei; Zhang, Wenchao Y. Li, H. Nishi, P. Pang (eds.) (2024). 77–83.
  • Network-Transparent Service Container and Migration with Information Distribution Management in Edge Environments. Namba, Yohei; Shimahara, Shogo; Nishi, Hiroaki Y. Li, H. Nishi, P. Pang (eds.) (2024). 23–28.
  • Big Data 4.0 = Meta4 (Big Data) = The Era of Big Intelligence. Sun, Zhaohao Y. Li, H. Nishi, P. Pang (eds.) (2024). 14–22.
  • Architecture in the Peruvian Real Estate Sector Based on Blockchain to Prevent Fraud. Quiroz, Andres Raul Dolorier; Murillo, Christian Manuel Valera; Vargas, Pedro Segundo Castañeda Y. Li, H. Nishi, P. Pang (eds.) (2024). 7–13.
  • Infrared weak small ship detection based on improved local contrast algorithm. Zhu, Qinghua; Yuan, Weidong; Chen, Yucong; He, Runping; Wang, Zhefei Y. Li, H. Nishi, P. Pang (eds.) (2024). 98–102.
  • Construction of Virtual Simulation Teaching Platform for Risk Experimental Projects in VR Environment. Fu, Gaocai; Jiang, Yu; Xiao, Jun; Huang, Peide; Luo, Xu; Ni, Minhui; Liu, Xianjv Y. Li, H. Nishi, P. Pang (eds.) (2024). 92–97.
  • A magnetar giant flare in the nearby starburst galaxy M82. Mereghetti, Sandro; Rigoselli, Michela; Salvaterra, Ruben; Pacholski, Dominik Patryk; Rodi, James Craig; Gotz, Diego; Arrigoni, Edoardo; D’Avanzo, Paolo; Adami, Christophe; Bazzano, Angela; Bozzo, Enrico; Brivio, Riccardo; Campana, Sergio; Cappellaro, Enrico; Chenevez, Jerome; De Luise, Fiore; Ducci, Lorenzo; Esposito, Paolo; Ferrigno, Carlo; Ferro, Matteo; Israel, Gian Luca; Le Floc’h, Emeric; Martin-Carrillo, Antonio; Onori, Francesca; Rea, Nanda; Reguitti, Andrea; Savchenko, Volodymyr; Souami, Damya; Tartaglia, Leonardo; Thuillot, William; Tiengo, Andrea; Tomasella, Lina; Topinka, Martin; Turpin, Damien; Ubertini, Pietro (2024). 629(8010) 58–61.
  • An analysis of the suitability of OpenAlex for bibliometric analyses. Alperin, Juan Pablo; Portenoy, Jason; Demes, Kyle; Larivière, Vincent; Haustein, Stefanie (2024).
  • Witness Encryption for Succinct Functional Commitments and Applications. Campanelli, Matteo; Fiore, Dario; Khoshakhlagh, Hamidreza in Lecture Notes in Computer Science, Q. Tang, V. Teague (eds.) (2024). (Vol. 14602) 132–167.
  • NOLA: Compressing LoRA using Linear Combination of Random Basis. Koohpayegani, Soroush Abbasi; Navaneet, KL; Nooralinejad, Parsa; Kolouri, Soheil; Pirsiavash, Hamed (2024).
  • Buy Verified Payoneer Accounts. Us), 24 Hours Reply/(Contact; bestsmmsolution@gmail.com, Email :; +1(530)5636354, WhatsApp :; @bestsmmsolution0, Telegram :; BestSMMSolution, Skype : (https://bestsmmsolution.com/product/buy-verified-payoneer accounts/, ed.) (2024). 19(6) 775–779.
  • Quantification of Trypanosoma Brucei social motility indicates different colony growth phases. Kuhn, Andreas; Krueger, Timothy; Schuettler, Magdalena; Engstler, Markus; Fischer, Sabine C (2024).
  • Buy Verified Wise Account - All Documents verified. wise Account, Buy Verified (https://bestsmmsolution.com/product/buy-verified-transferwise account/, ed.) (2024).
  • Window IT Presents: Take the Best Mohali Digital Marketing Course to Develop Your Skills. IT, Window (2024).
  • β-Blockers After Heart Attacks Might Not Lower Deaths for Some. Harris, Emily (2024).
  • Easy Home Decorating: Simple Tips for Stylish Spaces. haran, shreya (H. decor items encompass a wide array of accessories; furnishings that elevate the ambiance; style of any living space. F. elegant vases; decorative throw pillows to statement- making wall art; these items add personality cozy rugs; the right home decor pieces can transform a house into a home. W. endless options available charm to every room. Whether you’re aiming for a modern minimalist aesthetic or a cozy farmhouse vibe; create a space that reflects your personality; lifestyle.; https://www.decorcorner.in/, eds.) (2024).
  • Rethinking FID: Towards a Better Evaluation Metric for Image Generation. Jayasumana, Sadeep; Ramalingam, Srikumar; Veit, Andreas; Glasner, Daniel; Chakrabarti, Ayan; Kumar, Sanjiv (2024).
  • ReLU Strikes Back: Exploiting Activation Sparsity in Large Language Models. Mirzadeh, Iman; Alizadeh, Keivan; Mehta, Sachin; Mundo, Carlo C Del; Tuzel, Oncel; Samei, Golnoosh; Rastegari, Mohammad; Farajtabar, Mehrdad (2023).
  • Critique of Ontological Militarism. Furtado, Henrique Tavares (2023). 17(3) olad012.
  • Filosof’ia de la guerra en la Antigüedad Tard’ia. La tradición neoplatónica. Castillo, Luis Roger; others (2022). 11(22) 16–39.
  • Hybrid ontology for safety, security, and dependability risk assessments and Security Threat Analysis (STA) method for industrial control systems. Alanen, Jarmo; Linnosmaa, Joonas; Malm, Timo; Papakonstantinou, Nikolaos; Ahonen, Toni; Heikkilä, Eetu; Tiusanen, Risto (2022). 220 108270.
  • Artificial Intelligence-Based Early Detection Of Acute Kidney Injury After Cardiac Surgery. Kalisnik, Jurij Matija; Bauer, André; Vogt, Ferdinand Aurel; Stickl, Franziska Josephine; Zibert, Janez; Fittkau, Matthias; Bertsch, Thomas; Kounev, Samuel; Fischlein, Theodor (2022).
  • Emotions in War: The Emotionality-Rationality Equation in Clausewitz’s Theory of War. Emeklier, Bilgehan; Emeklier, Nihal (2022). 6(1)
  • Artificial Intelligence-Based Early Detection Of Acute Kidney Injury After Cardiac Surgery. Kalisnik, Jurij Matija; Bauer, André; Vogt, Ferdinand Aurel; Stickl, Franziska Josephine; Zibert, Janez; Fittkau, Matthias; Bertsch, Thomas; Kounev, Samuel; Fischlein, Theodor (2022).
  • Marktführer des Online-Handels: Wirkungen auf Arbeit und Beschäftigung in Deutschland Fuchs, Martina; Dannenberg, Peter; Riedler, Tim; Wiedemann, Cathrin in Study der Hans-Böckler-Stiftung (2021). Hans-Böckler-Stiftung, Düsseldorf.
  • Evaluation of Post-hoc XAI Approaches Through Synthetic Tabular Data. Tritscher, Julian; Ring, Markus; Schlr, Daniel; Hettinger, Lena; Hotho, Andreas D. Helic, G. Leitner, M. Stettinger, A. Felfernig, Z. W. Ra’s (eds.) (2020). 422–430.
  • Nilpotent symplectic alternating algebras II. Sorkatti, Layla; Traustason, Gunnar (2016).
  • Nilpotent symplectic alternating algebras I. Sorkatti, L.; Traustason, G. (2015). 423 615–635.
  • Symplectic Alternating nil-algebras. Tortora, A.; Tota, M.; Traustason, G. (2012). 357 183–202.
  • Identifying Implicit Relationships. https://usa5starit.com/product/buy-verified-binance accounts/ (24 24-hour Reply/Contact; ✅Email: usa5starit@gmail.com; ✅Skype: @usa5starit; ✅Telegram: @usa5starit1; ✅whatsapp:+1(716)5011667, eds.) (2012). 56(3/4) 12:1–12:10.
  • Powerful 2-Engel groups II. Traustason, G. (2012). 319 3301–3323.
  • Engel groups. Traustason, G. (2011). Volume II, 520-550 Lecture Note Ser. 388.
  • Finite 3-groups of class 3 whose elements commute with their automorphic images. Abdollahi, A.; Faghihi, A.; Linton, SA.; OBrien, EA. (2010). 95(1) 1–7.
  • Hip and knee positions during the curling delivery. Technical Report (Master thesis), Kraemer, Ellanora PhD thesis, University of Wisconsin La Crosse. (2010).
  • Symplectic Alternating Algebra. Traustason, G. (2008). 18(4) 719–757.
  • Powerful 2-Engel groups. Moravec, P.; Traustason, G. (2008). 36 4096–4119.
  • Geometry and Topology in Relativistic Cosmology. Luminet, Jean-Pierre (2007).
  • Ontologies informatiques. Gandon, Fabien (2006).
  • Unsolved Problems in Group Theory. The Kourovka Notebook. No. 16. Mazurov, V. D.; Khukhro(eds.)00, E. I. (2006).
  • Unsolved Problems in Group Theory. The Kourovka Notebook. No. 16 (English version). Mazurov, V.D.; Khukhro(eds.), E.I. (2006).
  • Psi u trgovištu Aralica, Ivan (2004). Večernji list, Zagreb.
  • Infinite Burnside groups of even exponent. Lysenok, I. G. (1996). 60(3) 453.
  • A three-dimensional, iterative mapping procedure for the implementation of an ionosphere-magnetosphere anisotropic Ohm’s law boundary condition in global magnetohydrodynamic simulations. Goodman, M. L. (1995). 13(8) 843–853.
  • Buy Verified Cash App Account - 100% Safe, Access from USA. Buy verified cash app account at the best IT service provider smmsellshop at cost effective price, we provide SSN (1994).
  • On the Burnside problem on periodic groups. Ivanov, S. V. (1992). 27(2) 257–260.
  • Solution of the restricted Burnside problem for groups of odd exponent. Zel’manov, E. I. (1991). 36(1) 41–60.
  • A solution of the restricted Burnside problem for 2-groups. Zel’manov, E. I. (1991). 182(4) 568–592.
  • Pisac i njegov urednik: Izabrana pisma: Ivan Aralica i Zlatko Crnković Aralica, Ivan (1988). Znanje, Zagreb.
  • Ironies of Automation. Bainbridge, Lisanne (1983). 19(6) 775–779.
  • The Burnside problem and identities in groups Adjan, S. I. (1979). Springer-Verlag (Berlin and New York).
  • Buy Verified Paxful Accounts 100% Safe US & UK. Technical Report (PhD dissertation), Mengs, Ulrich (1974).
  • Alternating trilinear forms and groups of exponent 6. Atkinson, M. D. (1973). 16(01) 111–128.
  • On nil-algebras and residually finite p-groups. Golod, E.S. (1964). 28(2) 273–276.
  • The Burnside problem. Kostrikin, A. I. (1959). 23(1) 3–34.
  • Solution of the BE. S. Golod, Some problems of Burnside type, Internat. Congress Math. Moscow (1966), 284-298 = Amer. Math. Soc. Translations (2) 84 (1969) 83-88.Burnside problem for exponent six. Hall, Marshall; others (1958). 2(4B) 764–786.
  • On the p-length of p-soluble groups and reduction theorems for Burnside’s problem. Hall, P.; Higman, G. (1956). 3(1) 1–42.
  • Groups in which the commutator operations satisfies certain algebraic conditions. Levi, F. W. (1942). 51(1) pp. 87–97.
  • Solution of Burnside’s problem for exponent 4. Sanov, Ivan N (1940). 10(166-170) 132.
  • Finite Groups in which Conjugate Operations are Commutative. Hopkins, C. (1929). 51(1) pp. 35–41.
  • On groups in which every two conjugate operations are permutable. Burnside, W. 35 28–38.
  • On an unsettled question in the theory of discontinuous groups. Burnside, W. (1902). 33 230–238.

By continuing to use the site, you agree to the use of cookies. more information

The cookie settings on this website are set to "allow cookies" to give you the best browsing experience possible. If you continue to use this website without changing your cookie settings or you click "Accept" below then you are consenting to this.

Close